StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer sciences and information technology - Essay Example

Cite this document
Summary
A switch is suitable for use in a situation where a large number of devices connected using a computer network exists. According to Rivard (2013), the switch facilitates proper flow of information to an intended device through transmission of a message across the network. Usually, a router comes into play when the concerned individual desires to transfer packets among a local area network and a wide area network (Rivard, 2013)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Computer sciences and information technology
Read Text Preview

Extract of sample "Computer sciences and information technology"

Computer Sciences and Information Technology Computer Sciences and Information Technology A switch is suitable for use in a situation where a large number of devices connected using a computer network exists. According to Rivard (2013), the switch facilitates proper flow of information to an intended device through transmission of a message across the network. Usually, a router comes into play when the concerned individual desires to transfer packets among a local area network and a wide area network (Rivard, 2013).

The main reason is for security purposes as the router uses an internet protocol address. The short-cut technique is quite common as it provides a list of available commands for instance for EXEC commands, one can type Router> ? . According to Lynn (2012), cut it off, a well-known technique eases the process of remembering a large number of commands. Lynn also argued that for instances, a student can enter sh ip ro when dealing with the command or show IP route rather than type the whole command (2012).

Among the unique features of windows server 2012 is a new server system, which using the cloud concept is able to support multiple servers. With regard to data deduplication, the windows server 2012 has an input data deduplication system that works with virtual hard disks and is able to store data that the computer has detected as duplicated, in a separate system (Lynn, 2012). Microsoft System Centre refers to a suite that focuses predominantly on products associated with systems management, which act as tools for monitoring virtualized environments (Lynn, 2012).

Features of the system include packs of process management that fall under service manager and make it possible to configure, change controls and update servers. Furthermore, the system features summarizes inventory that aids troubleshooting by tracking components of both hardware and software. A software system or templates would be instrumental in developing a business continuity plan, a process that would begin by outlining the roles of the each group, develop the plan while keeping in mind the key mandate and assessing risks involved.

Okolita demonstrated that following in the procedure would be to disseminate the information to groups online for proper communication, which is vital for executing the plan (2009). The first strategy in developing an efficient plan is to create a committee that would perform the role of governance, stipulating and assigning responsibilities. In addition, the management has to give priority to the available assets in the plan development and take measures to guarantee the readiness of the firm for the entire process (Snedaker & Rima, 2014).

Lastly, the committee should assess the possible risks and institute a framework for auditing the continuity plan to check any weakness that may hamper with its efficiency. References Lynn, S. (2012). Windows server 2012: Up and running. Sebastopol, CA: OReilly Media Publishers. Okolita, K. (2009). Building an Enterprise-Wide Business Continuity Program. New York: CRC Publishers. Rivard, E. (2013). Cisco CCNA Routing and Switching 200-120: Pack. Indianapolis: Cisco Publishers. Snedaker, S.

, & Rima, C. (2014). Business continuity and disaster recovery planning for IT professionals. Waltham, MA: Syngress Publishers.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer sciences and information technology Essay”, n.d.)
Computer sciences and information technology Essay. Retrieved from https://studentshare.org/information-technology/1698835-computer-sciences-and-information-technology
(Computer Sciences and Information Technology Essay)
Computer Sciences and Information Technology Essay. https://studentshare.org/information-technology/1698835-computer-sciences-and-information-technology.
“Computer Sciences and Information Technology Essay”, n.d. https://studentshare.org/information-technology/1698835-computer-sciences-and-information-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer sciences and information technology

Computer Sciences and Information Technology

Word 2010 may be used for making professional reports, resume, memos or invoices. Excel is a program used to Computer sciences and information technology There are several programs included in the Microsoft Office Some of these programs are Word, Excel, PowerPoint, Publisher and Access (Microsoft Corporation, n.... It is used to manage and organize information with the use of its templates and other modular components....
1 Pages (250 words) Essay

Information Technology and Cyber Attackers

Dongfan was sentenced on February 8, 2009 under the act of the Economic Espionage passed in 1966 in US (LOS ANGELES, Questions First Computer sciences and information technology d Questions E-Activity An enormous quantity of information and economic is transferred by the cheaper and faster technology in these days.... It is concluded that the information security is important from both inside and outside attackers.... America's Cyber Future, Security and Prosperity in the information Age, Centre for a New American Security, Vol....
1 Pages (250 words) Essay

Adding value by analyzing an issue in a website

After Computer sciences and information technology Application to the undergraduate program at Trent The application process is an easy and exciting one since the guidelines are given and very easy to follow.... This process starts by the interested student visiting the Trent's University website, and selecting the undergraduate link on the menu bar. The undergraduate webpage… First of all, there is a link to a page where the student can ask any question regarding the application process and the courses they might be interested....
1 Pages (250 words) Article

Biometric Centralisation vs Biometric Balkanization: which is better

By: Computer sciences and information technology of The Institution1.... In centralization, a single biometric technology is used for all purposes, some of which may not require them.... At the same time, individual citizens acquire safety for their private information....
1 Pages (250 words) Essay

Computer Sciences and Information Technology Microsoft Updates

Other recommendations are, keeping personal computers on sleep mode, managing power settings, using the Ready Boost option to increase the memory of the computer and elevating CPU Priority (Callahan, Computer sciences and information technology Microsoft Up s al Affiliation) According to Callahan, there are a number of recommendations that when used, can optimize the installation of Windows 8 Professional.... Other recommendations are, keeping personal computers on sleep mode, managing power settings, using the Ready Boost option to increase the memory of the computer and elevating CPU Priority (Callahan, 2011)....
1 Pages (250 words) Essay

Payword, Millicent, and MicroMint - which is the best

It reduces operational cost Computer sciences and information technology By: Payword, Millicent, and MicroMint - Which is the Best Lecturer's Date1.... Bank Systems & technology, p.... Pay word micropayment system however breaches the application of anonymity whereby vendors obtain the personal information of the users for verification.... Vendors also obtain the personal information of the users....
1 Pages (250 words) Essay

Micromint micropayment

The merchant only contracts with the broker during the sales of the Micro mint micropayment By: Computer sciences and information technology Lecturer's How Millicent Micropayment System WorksMillicent operates as an electronic currency system referred to as scrip, which can be used to buy electronic contents from vendors.... This can protect sensitive information from reaching intruders.... 24-28, Lecture Notes in computer Science (Vol.... , Financial Cryptography: First International Conference (FC '97), Anguilla, British West Indies, February 24-28, Lecture Notes in computer Science (Vol....
1 Pages (250 words) Essay

Impact of Cell Phones

obile phones provide a way for people to access information.... In the modern world, information is power and mobile phones offer a fast and affordable way of assessing this information by using mobile internet (Henline and Harris, 2006).... The paper “Impact of Cell Phones” clearly shows the advantages and disadvantages of the use of cell phones in the social scene....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us